1/44
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Includes renaming, control flow obfuscation, and string encryption.
One interface, many implementations. Application: Multiple classes responding to same method
Any input interface: files, protocols, APIs
Bypass login, extract data, modify tables.
Poor coding lack of reviews, rushing to release.
Structured approach to identifying threats. Tools: DFDs, STRIDE, Attack Trees
Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, Elevation of Privilege
Damage, Reproducibility, Exploitability, Affected users, Discoverability